Citation: | WANG Jie. Fair Secure Two-Party Computation Protocol Based on Game Theory[J]. Journal of Southwest Jiaotong University, 2016, 29(5): 902-909. doi: 10.3969/j.issn.0258-2724.2016.05.012 |
YAO A C. Protocols for secure computation[C]//Proc. of the 23rd IEEE Symposium on Foundations of Computer Science (FOCS). Los Alamitos: IEEE Computer Society Press, 1982: 160-164.
|
GOLDREICH O, MICALI S, WIGDERSON A. How to play any mental game[C]//Proc. of the 19th Annual ACM Symposium on Theory of Computing (STOC). New York: ACM Press, 1987: 218-229.
|
GOLDWASSER S. Multi-party computation: past and present[C]//Proc. of the 16th Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1997: 21-24
|
GOLDREICH O. Foundations of cryptography: volume 2, basic applications[M]. Cambridge: Cambridge University Press, 2004: 79-92.
|
BLAKE I F, KOLESNIKOV V. Strong condition oblivious transfer and computing on intervals[G]//Proc. of Advances in Cryptology. Berlin: Springer, 2004: 515-529.
|
李顺东,戴一奇,游启友. 姚氏百万富翁问题的高效解决方案[J]. 电子学报,2005,33(5): 769-773. LI Shundong, DAI Yiqi, YOU Qiyou. An efficient solution to Yao' millionaires' problem[J]. Acta Electronica Sinica, 2005, 33(5): 769-773.
|
LIN H Y, TZENG W G. An efficient solution to the millionaires problem based on homomorphic encryption[C]//In ASIA crypto logy 2005. Berlin: Springer, 2005: 456-466.
|
LINDELL Y, PINKAS B. A proof of Yao's protocol for secure two-party computation[J]. Journal of Cryptology, 2009, 22(5): 161-188.
|
唐春明,石桂花,姚正安. 排序问题的安全多方计算协议[J]. 中国科学:信息科学,2011,41(7): 789-797. TANG Chunming, SHI Guihua, YAO Zheng'an. Secure multi-party computation protocol for sequencing problem[J]. Scientia Sinica Informationis, 2011, 41(7): 789-797.
|
田有亮,彭长根,马建峰,等. 通用可组合公平安全多方计算协议[J]. 通信学报,2014,35(2): 54-62. TIAN Youliang, PENG Changgen, MA Jianfeng, et al. Universally composable secure multiparty computation protocol with fairness[J]. Journal on Communications, 2014, 35(2): 54-62.
|
CLEVE R. Limits on the security of coin flips when half the processors are faulty[C]// In 18th Annual ACM Symposium on Theory of Computing. Berkeley:, 1986: 364-369.
|
GORDON D, HAZAY C, KATZ J, et al. Complete fairness in secure two-party computation[C]//Proc of the 40th Annual ACM Symposium on Theory of Computing (STOC). New York: ACM Press, 2008: 413-422.
|
HALPERN J, TEAGUE V. Rational secret sharing and multiparty computation[C]//Proc of the 36th Annual ACM Symposium on Theory of Computing(STOC). New York: ACM Press, 2004: 623-632.
|
KOL G, NAOR M. Games for exchanging information[C]//Proc. of the 40th Annual ACM Symposium on Theory of Computing(STOC). New York: ACM, 2008: 423-432.
|
ABRAHAM I, DOLEV D, GONEN R, et al. Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation[C]//Proc. of the 25th ACM symposium on Principles of distributed computing(PODC'06). New York: ACM, 2006: 53-62.
|
LYSYANSKAYA A, TRIANDOPOULOS N. Rationality and adversarial behavior in multiparty computation[G]//Proc. the 26th Annual Cryptology. Berlin: Springer, 2006: 180-197.
|
ASHAROV G, CANETTI R, HAZAY C. Towards a game theoretic view of secure computation[G]//Proc. of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2011: 426-445.
|
GROCE A, KATZ J. Fair computation with rational player[G]//Proc. of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2012: 81-98.
|
张恩,蔡永泉. 理性的安全两方计算协议[J]. 计算机研究与发展,2013,50(7): 1409-1417. ZHANG En, CAI Yongquan. Rational secure two-party computation protocol[J]. Journal of Computer Research and Development, 2013, 50(7): 1409-1417.
|
王伊蕾,郑志华,王皓,等. 满足可计算序贯均衡的理性公平计算[J]. 计算机研究与发展,2014,51(7): 1527-1537. WANG Yilei, ZHENG Zhihua, WANG Hao, et al. Rational fair computation with computational sequential equilibrium[J]. Journal of Computer Research and Development, 2014, 51(7): 1527-1537.
|
OSBORNE M, RUBINSTEIN A. A course in game theory[M]. Cambridge: MIT Press, 2004: 10-15.
|
KATZ J. Bridging game theory and cryptography:recent results and future directions[G]//Proc. of the 5th Theory of Cryptography Conf(TCC 2008). Berlin: Springer, 2008: 251-25.
|
[1] | SUN Chao, YIN Haowei, ZHANG Wei, LI Menghui. Traffic Equilibrium Model of Reliable Network Based on Bounded Rationality[J]. Journal of Southwest Jiaotong University, 2023, 58(1): 83-90. doi: 10.3969/j.issn.0258-2724.20210679 |
[2] | WANG Na, LI Yinzhen, CHAI Huo. Decision-Making Approach of Two-Sided Many-to-Many Matching of Supply and Demand for Logistics Service Based on Matching Balance[J]. Journal of Southwest Jiaotong University, 2022, 57(2): 425-433. doi: 10.3969/j.issn.0258-2724.20200567 |
[3] | CHEN Weirong, LIU Jiawei, GUO Ai, LI Yan, LIU Zhixiang, ZHANG Xuexia. Experimental Study on Voltage Uniformity of 14.4 kW PEMFC Stack Single Cell[J]. Journal of Southwest Jiaotong University, 2017, 30(3): 429-438. doi: 10.3969/j.issn.0258-2724.2017.03.001 |
[4] | DUAN Manzhen, CHEN Guang, CAO Huiyun, ZHOU Huxing. Game Model for Balanced Use of Parking Lots[J]. Journal of Southwest Jiaotong University, 2017, 30(4): 810-816. doi: 10.3969/j.issn.0258-2724.2017.04.021 |
[5] | WANG Zhifu, LIU Mingchun, ZHOU Yang. Estimation of Longitudinal Speed of In-wheel Motor Driven Vehicle Using Fuzzy Extended Kalman Filter[J]. Journal of Southwest Jiaotong University, 2015, 28(6): 1094-1099. doi: 10.3969/j.issn.0258-2724.2015.06.017 |
[6] | CHEN Wenwu, LIPengfei, LIANGTao, ZHANGYuxiang, ZHANGJingke. Dynamic Responses of East Temple Pagoda of Subashi Temple under Seismic Loads[J]. Journal of Southwest Jiaotong University, 2011, 24(3): 373-378. doi: 10.3969/j.issn.0258-2724.2011.03.003 |
[7] | CHENG Lin, YU Chunqing, WANG Wei, XU Xiangdong. Method for Calculating Intersection Diversion Ratio Based on Network Equilibrium[J]. Journal of Southwest Jiaotong University, 2008, 21(2): 165-172. |
[8] | SONG Bo, LI Xiu-feng, JIANG Chao-zhe. Extension to TTCN-3 Synchronization[J]. Journal of Southwest Jiaotong University, 2005, 18(1): 39-43. |
[9] | YANG Jun-liu, HEDan. Numerical Simulation ofCavity DevelopmentBased on Improved Calculation ofPlume Region[J]. Journal of Southwest Jiaotong University, 2005, 18(5): 605-609. |
[10] | SONG Wen, YILiang-zhong, MUXing-jun. SONG Wen; YILiang-zhong; MUXing-jun[J]. Journal of Southwest Jiaotong University, 2004, 17(5): 656-659. |
[11] | DENG Pei-lin, ZHANG Rui-ming. Analysis of Corrupt Competition in Bids[J]. Journal of Southwest Jiaotong University, 2003, 16(6): 691-694. |
[12] | ZHANG Cai-yu. Analysis of Option Pricing with Game Theory[J]. Journal of Southwest Jiaotong University, 2003, 16(3): 367-370. |
[13] | HANLing, ZHAOLian-wen. Static Game Model of Incomplete Information[J]. Journal of Southwest Jiaotong University, 2003, 16(3): 359-362. |
[14] | ZHUJian-mei. Game Model of Selection of Competitive Transportation Corridors[J]. Journal of Southwest Jiaotong University, 2003, 16(3): 336-340. |
[15] | ZHOUJie, WANGXing-yu, YAOHong-xin. Signaling Game of the Chinese Security Market Structure after the Introduction of QFII System[J]. Journal of Southwest Jiaotong University, 2003, 16(3): 363-366. |
[16] | YAOHong-xin, WUZhen-ye. Analysis of Multinational Strategy Alliances with Game Theory[J]. Journal of Southwest Jiaotong University, 2002, 15(3): 314-318. |
[17] | CHEN Chun-jun, XIAO Heng. Research and Application of Wigner-Ville Distribution Algorithm[J]. Journal of Southwest Jiaotong University, 2002, 15(2): 146-149. |
[18] | TAN De-qing, HUPei, OUYANG Yan-kun. A Multidimensional Game Model and Its Equilibrium in Bertrand Duopoly[J]. Journal of Southwest Jiaotong University, 2002, 15(6): 698-702. |